Monitoring OT/industrial networks for intrusions and security status can impair the security of industrial operations as easily as enhance security. This webinar reviews common designs for OT security monitoring and attack patterns that take advantage of the vulnerabilities intrinsic to such designs. The webinar then reviews a handful of modern design alternatives for monitoring OT networks that are intrinsically safer than these common, flawed approaches.
Who's it for: Anyone who designs or approves enterprise, OT and ICS security monitoring programs, such as those used in manufacturing, power plants, refineries, railways, airports, water utilities, large buildings and campuses and many others.
In this webinar you will learn: